Wanted and Arrested Person Records.
When a firearms This is an extensive list of small arms — pistol, machine gun, grenade launcher, anti-tank rifle — that includes variants.
: Top - 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Although in the end law enforcement officers finally captured this woman, better use of records probably would have resulted in an earlier arrest and may have prevented subsequent offenses. Information management plays a key part to successful policing. If managed and used properly, arrest and wanted person records can provide officers significant assistance in the resolution of crime and apprehension of offenders.
Recently, members of the Southern Working Group for the FBI's Criminal Justice Information Services See Information Systems. (CJIS CJIS Criminal Justice Information System
CJIS Criminal Justice Information Services Division (FBI) ) advisory process met to discuss advances in law enforcement information systems. One major issue concerned all members in attendance--how to get agencies to enter wanted persons into the National Crime Information Center (NCIC NCIC National Crime Information Center
NCIC National Cancer Institute of Canada
NCIC North Carolina Industrial Commission
NCIC National Cartographic Information Center
NCIC National Cancer Information Center (American Cancer Society) ).  This problem goes beyond just the issue of entering persons into NCIC; it resonates to include fingerprinting and conducting wanted person checks on recently arrested individuals. In fact, the issue applies to all basic processes associated with managing information about individuals sought for arrest, as well as those recently arrested.
While the working group attempts to establish integrated justice data systems, develop new biometric identification Noun 1. biometric identification - the automatic identification of living individuals by using their physiological and behavioral characteristics; "negative identification can only be accomplished through biometric identification"; "if a pin or password is lost or techniques, and use other new information technologies in law enforcement, the police and other criminal justice practitioners A Justice and Public Safety Practitioner is a local, state, tribal, or federal government employee who is in the practice of providing, administering or promoting justice and public safety services according to the laws, policies and practices of the government entity they serve. must focus on three essential procedures. Following these basic steps in managing information about wanted and arrested subjects can help officers expedite the identification and apprehension of criminals.
Fingerprinting All Full-Custody Arrests
Most citizens believe that when police arrest them they get fingerprinted. Although this generally happens, for various reasons, some officers do not always fingerprint fingerprint, an impression of the underside of the end of a finger or thumb, used for identification because the arrangement of ridges in any fingerprint is thought to be unique and permanent with each person (no two persons having the same prints have ever been everyone they arrest. Police managers should ensure that the fingerprints of every person subjected to a full-custody arrest are submitted to a state identification bureau or central records repository. The state bureau and the FBI CJIS Division will use the fingerprints to establish a criminal history and identification record on that individual. Criminal history record information, supported by fingerprints, will allow positive identification in both criminal and civil investigations. Fingerprints permit the most accurate and reliable searches of criminal records. Oftentimes of·ten·times also oft·times
Adv. 1. oftentimes - many times at short intervals; "we often met over a cup of coffee"
frequently, oft, often, ofttimes , the use of fingerprints may determine whether law enforcement can identify a subject.
Although police agencies can have a well-managed records office, occasionally, some agencies do not fingerprint until obtaining a disposition for pending charges on an individual. Because the FBI and the state record repositories encourage accuracy and completeness in all record keeping, an officer in charge may have concerns about furnishing incomplete records. However, a complete record often results as the product of more than one submission. Most criminal history repositories manage the disposition as a distinct record, or segment, linked to the arrest. If an agency does not submit fingerprints promptly following an arrest, any need to identify the subject during the interval between arrest and disposition may go unmet. Sometimes, an agency may experience a high volume of arrests and simply may allow some subjects to skip the fingerprinting step, but this occurs at a high cost. If many departments follow this practice, the cumulative impact will result in large numbers of arrested persons either without t imely and accurate criminal records or no records at all.
As a result, some states have passed laws that require the fingerprinting of all persons charged with crimes. Because persons charged through the use of an arrest summons often are exempt from such requirements, departments generally cite and release those individuals. Researchers at SEARCH, the National Consortium for Justice Information and Statistics, surveyed state criminal history record systems and found that 28 states have laws that require local jails not only to fingerprint all admitted prisoners but to send the fingerprint to the state repository. 
The Integrated Automated Fingerprint Identification System The Integrated Automated Fingerprint Identification System (IAFIS) is a national fingerprint and criminal history system maintained by the Federal Bureau of Investigation (FBI). (LAFIS) initiative of the FBI promises radical improvement in the processing of fingerprints Under the IAFIS IAFIS Integrated Automated Fingerprint Identification System (FBI)
IAFIS International Association of Food Industry Suppliers concept of operations A verbal or graphic statement, in broad outline, of a commander's assumptions or intent in regard to an operation or series of operations. The concept of operations frequently is embodied in campaign plans and operation plans; in the latter case, particularly when the plans cover a series , booking agencies electronically submit fingerprints of arrest subjects to the appropriate state identification bureau (SIB sib: see clan. ). The SIB then searches its Automated Fingerprint Identification System Automated Fingerprint Identification System (or AFIS) is a system to automatically match one or many unknown fingerprints against a database of known prints. This is done for various reasons, not the least of which is because the person has committed a crime. database for a match. If the SIB cannot positively identify the fingerprints, they automatically electronically forward them to the FBI's CJIS Division for a further search.
In 1973, Congress amended the Omnibus omnibus: see bus. Crime and Safe Streets Act of 1968 to require, in part, that states and local agencies ensure the completeness of the criminal history record information in their state repositories. Because dispositions for arrest charges remain essential for so many purposes, ranging from employment matters to firearm firearm, device consisting essentially of a straight tube to propel shot, shell, or bullets by the explosion of gunpowder. Although the Chinese discovered gunpowder as early as the 9th cent., they did not develop firearms until the mid-14th cent. purchaser screening, it remains paramount that agencies create the arrest record first. Currently, fingerprints remain the best, and often only accepted, way to establish records that law enforcement can use to match conclusively with an unknown or questioned subject.
Those states that have ratified rat·i·fy
tr.v. rat·i·fied, rat·i·fy·ing, rat·i·fies
To approve and give formal sanction to; confirm. See Synonyms at approve. the Crime Prevention and Privacy Compact are mandated to use fingerprints to facilitate the interstate exchange of criminal history record information for noncriminal justice purposes. By 1997, 52 states or U.S. territories adopted data quality requirements that govern their criminal records. 
Entering Wanted Persons into NCIC
Placing names and identifying demographic data into NCIC will facilitate rapid service of arrest warrants and improve officer safety. Due to the heavy workload from combining the requirements for auditing and validating records, as well as confirming "hits," some agencies simply do not promptly enter persons wanted for minor violations and only enter those persons wanted for more serious crimes. However, because wanted persons do not know whether police have entered them into NCIC, they often may assume that police have stopped them because of their wanted status versus a minor traffic violation. This can result in unexpected actions by the individual (e.g., fight or flight) and may catch the officer off guard.
For their own safety, police must consider that individuals wanted for minor charges may resist arrest as often as those individuals with felonies. Therefore, it remains vital that the police can determine whether a person is wanted on any charge, no matter how serious the crime.
Because officers often know their subjects and expect to find them within a few days, they frequently place warrants over the visor in their patrol car, or in other convenient places, for easy retrieval. Unfortunately, during the interim, other officers in the same or another jurisdiction may have contact with the individual without even realizing that the individual has outstanding wants or warrants. Another department may have even jailed and released the individual because the officer either did not enter the individual into NCIC or did not enter the record in a timely manner.
Although NCIC mandates agencies to enter wanted records in a timely manner, some agencies do not enter or complete all wanted person entries. Although it remains true that every entry requires maintenance and action to remove it upon capture of the suspect, not promptly or thoroughly completing entries can result in costly mistakes.
To help ensure officer safety, managers should encourage their officers to "pack the record" when entering wanted persons in NCIC. By entering all available nonmandatory data, particularly vehicle information, officers can help make the NCIC record even more useful in locating wanted persons.
Checking Arrested Persons
Similar to the example of the firearm purchaser at the beginning of this article; some wanted person serve time in jail for a minor offense and get released without the discovery of their wanted status in another jurisdiction for a more serious crime. In most cases, a simple name search through the FBI's NCIC Wanted Person File will determine whether an individual is wanted.  Because criminals often use altered or false identification, fingerprints remain the best means to accurately identify subjects and deter mine whether they are wanted.
NCIC's "hit" confirmation procedures ensure rapid verification of an individual's wanted status. Within 10 minutes of the inquiry, the agency that entered the wanted person record must confirm to an inquiring agency if the subject is still wanted. Wanted person records remain in NCIC until the entering agency removes them.
To maximize the capability for conclusive identification, numerous states are working to implement the FBI IAFIS initiative that will allow rapid nationwide fingerprint-supported identification of subjects on record. IAFIS provides a 2-hour turnaround time (1) In batch processing, the time it takes to receive finished reports after submission of documents or files for processing. In an online environment, turnaround time is the same as response time. for electronically submitted criminal prints, which potentially can result in positive identifications in criminal cases. 
Various users have an ever-increasing demand for access to criminal justice information for a variety of reasons. Criminal justice practitioners should have immediate access to all of the information necessary to make informed quality decisions and to help ensure the safety of the officers involved. While certain procedures for fingerprinting, entering wanted records, and checking wanted status remain at the core of law enforcement information management, officers must remember the importance of the information each user provides and the impact it can have on other individuals or activities.
Good information management in law enforcement is more than mere record keeping, it provides tools for solving cases and preventing crime. Such information systems remain vital to continue progress in reducing crime rates, to aid in the effective administration of justice, and, ultimately, to help officers protect the communities they serve.
Major Huguley serves with the South Carolina South Carolina, state of the SE United States. It is bordered by North Carolina (N), the Atlantic Ocean (SE), and Georgia (SW). Facts and Figures
Area, 31,055 sq mi (80,432 sq km). Pop. (2000) 4,012,012, a 15. Law Enforcement Division in Columbia, South Caroilna.
(1.) For more information on the NCIC, see Stephanie L. Hitt, "NCIC 2000," FBI Law Enforcement Bulletin The FBI Law Enforcement Bulletin is published monthly by the FBI Law Enforcement Communication Unit, with articles of interest to state and local law enforcement personnel. , July 2000, 12-15.
(2.) U.S. Department of Justice. Bureau of Justice Statistics Noun 1. Bureau of Justice Statistics - the agency in the Department of Justice that is the primary source of criminal justice statistics for federal and local policy makers
BJS . Survey of State Criminal History Information Systems, 1999 (Washington, DC: Government Printing Office, NCJ NCJ National Criminal Justice
NCJ National Contest Journal
NCJ New Columbia Joist Co. 184793, October 2000), table 10, 33.
(3.) U.S. Department of Justice. Bureau of Justice Statistics. Compendium com·pen·di·um
n. pl. com·pen·di·ums or com·pen·di·a
1. A short, complete summary; an abstract.
2. A list or collection of various items. of State Privacy and Security Legislation: 1999 Overview, by SEARCH (Washington, DC: Government Printing Office, NCJ 182294, July 2000), 5.
(4.) A Wanted Person File inquiry also will cause an automatic crosssearch of the Foreign Fugitive, Missing Person, Violent Gang and Terrorist Organization, Protection Order, Deported Felon An individual who commits a crime of a serious nature, such as Burglary or murder. A person who commits a felony.
felon n. a person who has been convicted of a felony, which is a crime punishable by death or a term in state or federal prison. , Convicted Sexual Offender Registry, Convicted Persons on Supervised Release, and U.S. Secret Service Protective Files.
(5.) U.S. Department of Justice. Federal Bureau of Investigation Federal Bureau of Investigation (FBI), division of the U.S. Dept. of Justice charged with investigating all violations of federal laws except those assigned to some other federal agency. . Time CJIS Link (Clarksburg, West Virginia Clarksburg is a city in Harrison County, West Virginia, U.S. The population was 16,743 at the 2000 census. It is the county seat of Harrison CountyGR6. , fall 2000), 8.
(6.) Supra A relational DBMS from Cincom Systems, Inc., Cincinnati, OH (www.cincom.com) that runs on IBM mainframes and VAXs. It includes a query language and a program that automates the database design process. note 3, 9.
An IAFIS Success Story
In Massachusetts, the Police charged an 18year-old male with trespassing, underage drinking, and drinking in public. Based on these offenses, his release was imminent. However, using the FBI's Integrated Automated Fingerprint Identification System (IAFIS), law enforcement officers learned of wanted charges for a drug-related murder of another 18-year-old in Greenville, South Carolina
Greenville is a mid-sized city located in the upstate of South Carolina. It is the county seat of Greenville CountyGR6 . This case shows how IAFIS can raise the capacity of the police to identify wanted persons to the next generation of crime fighting Crime Fighting
See also Sleuthing.
devotes his life to fighting Gotham City’s criminals. [Comics: Berger, 160]
Canadian Mounties . 
Entering Wanted Person Records
NCIC records for wanted persons must include the FBI-assigned originating agency identifier; the subject's name, sex, race, height, weight, hair color, offense, and warrant date; and the agency case number. In addition, agencies must enter at least one numeric identifier with the record, such as the subject's date of birth, FBI number, vehicle operator license number, or social security number. Based on this information alone, investigators generally can make a tentative identification of an individual, although fingerprint comparison remains more reliable and can provide the basis for a more conclusive result.